Showing posts from December, 2018

How PUBG Mobile hacks works? Is hacking APK legal?

PUBG Mobile hacking , this might sound fascinating for some people but in actual reality how much potential this term has? Let’s find out here. As we all know that every lock has its own respective key, which can’t be op…

Remote Password cracking with Brutus : the Script Kiddie’s Way

Hi everybody, today I’m gonna show you remote password cracking with Brutus. For the newbies, script kiddie is a person with little knowledge  of hacking or any programming languages and instead searches for automatic tools t…

Online Ethical Hacking Course (Android Hacking Tips) -2019

With these hacking tips, hack your neighbor's Wifi code and do much more. www.hackercomputerschool.com  Learn Online ethical hacking with us Smartphones are no longer limited to the simple role of calling and sending…

ADAPT: performs automated Penetration Testing for WebApps

ADAPT is a tool that performs Automated Penetration Testing for WebApps. It is designed to increase accuracy, speed, and confidence in penetration testing efforts. ADAPT automatically tests for multiple industry standard  OWASP…

VULNERABILITY ANALYSIS / WEB VULNERABILITY ANALYSIS

snyk v1.114.0 releases: find & fix known vulnerabilities in open-source dependencies snyk Snyk helps you find, fix and monitor known vulnerabilities in Node.js npm, Ruby and Java dependencies, both on an ad hoc basis…

RITA v1.1.1: Real Intelligence Threat Analytics

Real Intelligence Threat Analytics (RITA) is an open source framework for network traffic analysis. The framework ingests   Bro Logs , and currently supports the following analysis features: Beaconing Detection : Sea…

maltrail v0.11.10 releases: Malicious traffic detection system

Maltrail  is a malicious traffic detection system, utilizing publicly available (black)lists containing malicious and/or generally suspicious trails, along with static trails compiled from various AV reports and custom user…

Load More
That is All